Checkmarx Blog

Trump Website Hacked: Subdomain Takeover Defaces Fundraising Site

The 2016 American elections were overshadowed with cybersecurity concerns, accusations and in some cases, actual attacks. After an election season full of the current U.S. president accusing his opponent of “treasonously” weak cybersecurity, one of his own domains, associated with his fundraising efforts has been hacked and defaced by way of a subdomain takeover.  

Read More ›

3 Need-to-Know Security Terms for 2017: DevOps, “Shifting Left” and Ransomware

As organizations of all sizes and verticals prepare for whatever malicious cyber criminals have in store for them in the upcoming fiscal quarters,  we wanted to focus on three need-to-know terms that all security professionals should be aware of, and familiar with, in 2017.   Today, organizations need to increase the speed and quantity of

Read More ›

Speed up and Save: The ROI of Shifting Security Left [VIDEO]

A key differentiator for application security testing solutions (AST) is the ROI that each method brings to the organization. How much time can be saved? How much money can your organization save during remediation? When vulnerabilities make it past the development stage and onto production, how many different departments need to be involved in remediation

Read More ›

January 2017: Top Hacks and Breaches [INFOGRAPHIC]

The new year started with a whole new collection of hacks and security breaches. On the 4th of January, the known hacker CyberZeist claimed to have hacked the FBI’s website and proved it by leaking personal account information of several FBI agents. The hack happened by the exploitation of a zero-day vulnerability in the Plone CMS,

Read More ›

A First Timer’s Guide to the RSA USA Conference: 2017 Edition

Each February, the security world comes together in the techiest city in the world for a packed week of seminars, keynotes, checking out the latest and greatest security technologies, and of course, lots of parties. If you’ve never been to the RSA Conference and are planning on going in just a few short weeks –

Read More ›

DevOps & The Secure SDLC: Breaking Down Barriers with DevSecOps

DevOps & The Secure SDLC: Breaking Down Barriers with DevSecOps

The adoption of DevOps in enterprises around the world has created a whole new meaning to constant, rapid innovation and delivery. Iteration after iteration, DevOps is designed to improve the end product endlessly, pushing the limits of speed and collaboration. Don’t sacrifice security while achieving speed – embrace DevSecOps.

Read More ›

Cybersecurity in 2017: Interview with OWASP Author Jim Manico

As the software world still reels from the major hacks and breaches that occurred, and surfaced, in 2016, it’s critical that organizations ensure that their code security gets the attention that it deserves in 2017, and beyond.   In order to gain some quick insight into the application security landscape for 2017, we conducted a

Read More ›

The Season of Retail Hacks

Vera Bradley, fashion retail brand, is one of the many recent cybercrime victims. This luggage and handbag design company revealed that earlier this year, payment systems at multiple locations were hacked, and that an unknown number of personal payment cards used by customers may have been compromised.   With this hack, Vera Bradley joined the

Read More ›

Jump to Category